MGASA-2017-0084

Source
https://advisories.mageia.org/MGASA-2017-0084.html
Import Source
https://advisories.mageia.org/MGASA-2017-0084.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2017-0084
Related
Published
2017-03-25T16:56:41Z
Modified
2017-03-25T16:45:13Z
Summary
Updated libquicktime packages fix security vulnerability
Details

Integer overflow in the quicktimereadpascal function in libquicktime 1.2.4 and earlier allows remote attackers to cause a denial of service or possibly have other unspecified impact via a crafted hdlr MP4 atom. (CVE-2016-2399)

References
Credits

Affected packages

Mageia:5 / libquicktime

Package

Name
libquicktime
Purl
pkg:rpm/mageia/libquicktime?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.4-10.1.mga5.tainted

Ecosystem specific

{
    "section": "tainted"
}

Mageia:5 / libquicktime

Package

Name
libquicktime
Purl
pkg:rpm/mageia/libquicktime?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.4-10.1.mga5

Ecosystem specific

{
    "section": "core"
}